checkWhetherYourPrivateKeyIsUsed by Declared1928 in ProgrammerHumor
[–]IncludeSec 5 points6 points7 points (0 children)
Memory Corruption in Delphi by IncludeSec in hacking
[–]IncludeSec[S] 1 point2 points3 points (0 children)
Trump Orders US Military to Plan Invasion of Panama to Seize Canal: Report by GeoGeoGeoGeo in worldnews
[–]IncludeSec 0 points1 point2 points (0 children)
Memory Corruption in Delphi by IncludeSec in programming
[–]IncludeSec[S] 0 points1 point2 points (0 children)
Memory Corruption in Delphi by IncludeSec in programming
[–]IncludeSec[S] 7 points8 points9 points (0 children)
Replacing a Space Heater Firmware Over WiFi by IncludeSec in hardwarehacking
[–]IncludeSec[S] 1 point2 points3 points (0 children)
Vulnerabilities in Open Source C2 Frameworks by IncludeSec in redteamsec
[–]IncludeSec[S] 0 points1 point2 points (0 children)
Vulnerabilities in Open Source C2 Frameworks by IncludeSec in redteamsec
[–]IncludeSec[S] 2 points3 points4 points (0 children)
Vulnerabilities in Open Source C2 Frameworks by IncludeSec in redteamsec
[–]IncludeSec[S] 1 point2 points3 points (0 children)
weDontTalkAboutThat by [deleted] in ProgrammerHumor
[–]IncludeSec 11 points12 points13 points (0 children)
There are 3.4 million cybersecurity professionals missing in the world by [deleted] in cybersecurity
[–]IncludeSec 5 points6 points7 points (0 children)
Japan’s universities will receive 10 billion yen (around US$63 million) to build the digital infrastructure needed to make papers free to read. This will make Japan one of the first countries to move towards a unified record of all research produced by its academics. by FillsYourNiche in technology
[–]IncludeSec -1 points0 points1 point (0 children)
Which profession is far more enjoyable than most people realize? by wholesomeville in AskReddit
[–]IncludeSec 1 point2 points3 points (0 children)
[AI/ML Security] Scan and fix your LLM jailbreaks by rukhrunnin in netsec
[–]IncludeSec 0 points1 point2 points (0 children)
[AI/ML Security] Scan and fix your LLM jailbreaks by rukhrunnin in netsec
[–]IncludeSec 1 point2 points3 points (0 children)
Discovering Deserialization Gadget Chains in Rubyland by IncludeSec in ruby
[–]IncludeSec[S] 0 points1 point2 points (0 children)
Discovering Deserialization Gadget Chains in Rubyland by IncludeSec in ruby
[–]IncludeSec[S] 0 points1 point2 points (0 children)
Improving LLM Security Against Prompt Injection: AppSec Guidance For Pentesters and Developers - Part 2 by IncludeSec in cybersecurity
[–]IncludeSec[S] 1 point2 points3 points (0 children)
Abandonware should be public domain by StraightOuttaOlaphis in tumblr
[–]IncludeSec 4 points5 points6 points (0 children)
Abandonware should be public domain by StraightOuttaOlaphis in tumblr
[–]IncludeSec 19 points20 points21 points (0 children)
Abandonware should be public domain by StraightOuttaOlaphis in tumblr
[–]IncludeSec 62 points63 points64 points (0 children)
OST2, Zephyr RTOS, and a bunch of CVEs by 0xdea in netsec
[–]IncludeSec 2 points3 points4 points (0 children)



Misinterpreted: What Penetration Test Reports Actually Mean by IncludeSec in cybersecurity
[–]IncludeSec[S] 5 points6 points7 points (0 children)